Managing IT and Security Risks from Social Media in Your Business

Social media as a powerful communications platform: managing the risk and opportunities in your business and discussing the need for strategies and policies in dealing with social media issues.

In this presentation we will talk about:

- The widespread private use by employees and how many businesses embraced social media in their communications
- Current social media compliance policies with case studies
- Potential security risks, phishing scams, malware attacks
- Protection of (fair use of) intellectual property: The need to address the protection of intellectual property in policies and procedures of the proper business use of social media
- The regulatory requirements on the use of social media following the distinction in legal cultures and difference in compliance framework

New cyber risks and threats are emerging at a pace faster than ever before.
- How are cyber risks evolving
- Which risks can be managed through cyber insurance?

We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy. Cyber risk can’t be eliminated – it must be managed.

This webinar is brought to you in partnership with ISSA Financial Industry Special Interest Group.

About the Speaker:
Susan Young is a Senior Vice President and advisor with Marsh’s
national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.

This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

Join this webinar presentation to learn:
- Key lessons on the value of micro-marketing
- Lessons from cybernetics
- The value of cyber resilience in healthcare

About the Presenter:
Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.

Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.

About the Speaker:
Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.

It is commonly said that staff are the weakest link to security but is it really? Or we have missed something? Computers process and transmit data and we have been patching them for last 20 odd years or longer but how about humans?

This session will be all about how you turn your so called weakest link (the people) in to your strongest asset in the fight for cybercrime. Especially, with the new upcoming regulation GDPR it has become even more crucial.

About the Speaker:
Tarun Samtani is the Group DPO for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Retail, Leisure, Telecommunications, ISP's, Financial Services, Gambling and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments.

The cost of cyber crime is estimated to be around $600 billion globally. The lower cost of entry, along with technological advancements like machine learning and artificial intelligence, make for a fairly easy adoption.

Join this interactive panel to learn more about:
- How can enterprises defend their critical data assets from the financially motivated attacker?
- What is the best defence against ransomware, phishing and other attacks?
- The true cost of breach
- The role of security education in fighting cyber crime

Speakers:
- Raef Meeuwisse, CISM, CISA, Author of Cybersecurity for Beginners
- Dr. Vladlena Benson, Chair in Cybersecurity, Director of the Cybersecurity and Criminology Research Centre at the University of West London
- Griff James, Director, Damrod Analysis Ltd

What are the latest trends in the cyber-criminal underworld?
Which attacks are you likely to be preventing as we move further into 2018?
Who’s looking for vulnerability on your network?

These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
Chief Executive Officer, First Base Technologies LLP
Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.

This keynote talk by Raj Samani, Chief Scientist at McAfee, explores the recent campaigns against prominent journalists and politicians, particularly into their social media lives as a tool to support the political agendas of adversaries. Join this webinar to learn more about the steps that we as professionals must take to protect our own brands, and those of the organizations we work for.

About the Speaker:
Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organization in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL).

Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. SC Magazine named Samani as one of the Top 10 Influencers in cyber security in 2016.

Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy

The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

About the presenter:

Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.

In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.

Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets

With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.

This webinar is part of BrightTALK’s "Ask the Expert" Series. As attacks increase and start to have a significant impact, not just on companies’ bottom lines, but on their ability to carry out everyday business, cybersecurity has become much more of a boardroom issue than ever before. Increasingly this is causing forward looking organizations of all sizes to examine how security can be better integrated into business as normal.

No business is immune from cybercrime and the theft of personal information and intellectual property will increase as the ability to turn raw data into money-spinning opportunities increases. The response to cybercrime is a business decision – and is all about risk management. Between human error and malicious insiders, time has shown us the majority of data breaches originate inside company walls. Employees and negligence are the leading causes of security incidents but remain one of the least reported issues. The fightback starts not in the organization but with people and increasingly in the home. More and more security professionals need to be re-assessing the risks to company data at a personal level - mobile/consumer devices, internet connected devices, cloud access and storage both inside and outside the corporate environment.

Join the SANS Institute and Katzcy for an insightful presentation about the SANS CyberTalent Academy opportunities. This academy is designed to help qualified veterans in Maryland and Chicago - area receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in a matter of months, depending upon program selected. The program is at NO COST to the selected veterans who attend and includes training and certification.

Come listen to learn:
• What the selection process includes and important application tips
• Understand what kind of training is provided (length and format)
• How this training academy and related certifications can help your career

Max leads the CyberTalent division of the SANS Institute, the most trusted and the largest provider of information security training and certification in the world. In this role, he directs business development and stakeholder engagement to support the various SANS CyberTalent programs and develop strategic partnerships. He also oversees CyberTalent program operations and staff management. SANS CyberTalent helps organizations address their cybersecurity workforce development needs through initiatives such as the VetSuccess and Women's Immersion Academies as well as the Assessment tools. Max has worked in the public affairs and stakeholder engagement arena of cybersecurity for the past eight years, working with Government, corporate, and not-for-profit organizations, most recently as a Vice President at Cambridge Global Advisors, a homeland security strategic advisory services firm.

Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

Join this webinar to learn the GDPR requirements for managing personal information and digital identity.

What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.

This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security ​solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
- API cyberattack trends
- Review of recent API attacks
- How to monitor and protect your API activity
- How to detect and block API attacks on your data/apps (live demo)
- How to deliver reports with detailed traffic insight for any API
- Best practices for securing APIs

Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
- What is security automation and orchestration?
- Different automation models
- Examples of how automation has helped others
- Assessing your automation readiness
- Steps to get started - picking your first use cases

The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.

The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

Join this panel of world-class experts:

Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program

If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.

We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.

About the Presenter:
Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.

This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.